Sherlock Tool used To Hunt Social Media Accounts

Sherlock Tool used To Hunt Social Media Accounts

Installation Of python3 & pip [ kali linux ]

  • apt-get upgrade 
  • apt-get install python     
  • apt-get install python2
  • apt-get install python3-pip
  • apt-get install python-pip
  • apt-get install git

Installation Of python3 & pip [ Termux ]

  • pkg update
  • pkg install unstable-repo ( If it not found please update your termux to new version from playstore )
  • pkg install python2
  • pkg install python3
  • pkg install python3-pip
  • pkg install python-pip
  • pkg install git

Installation of SHERLOCK Tool

  • git clone https://github.com/sherlock-project/sherlock.git
  • python3 -m pip install -r requirements.txt

General Purposes

  • python3 sherlock.py -h
$ python3 sherlock.py --help
usage: sherlock.py [-h] [--version] [--verbose] [--rank]
[--folderoutput FOLDEROUTPUT] [--output OUTPUT] [--tor]
[--unique-tor] [--csv] [--site SITE_NAME]
[--proxy PROXY_URL] [--json JSON_FILE]
[--proxy_list PROXY_LIST] [--check_proxies CHECK_PROXY]
[--timeout TIMEOUT] [--print-found]
USERNAMES [USERNAMES ...]

Sherlock: Find Usernames Across Social Networks (Version 0.10.3)

positional arguments:
USERNAMES One or more usernames to check with social networks.

optional arguments:
-h, --help show this help message and exit
--version Display version information and dependencies.
--verbose, -v, -d, --debug
Display extra debugging information and metrics.
--rank, -r Present websites ordered by their Alexa.com global
rank in popularity.
--folderoutput FOLDEROUTPUT, -fo FOLDEROUTPUT
If using multiple usernames, the output of the results
will be saved to this folder.
--output OUTPUT, -o OUTPUT
If using single username, the output of the result
will be saved to this file.
--tor, -t Make requests over Tor; increases runtime; requires
Tor to be installed and in system path.
--unique-tor, -u Make requests over Tor with new Tor circuit after each
request; increases runtime; requires Tor to be
installed and in system path.
--csv Create Comma-Separated Values (CSV) File.
--site SITE_NAME Limit analysis to just the listed sites. Add multiple
options to specify more than one site.
--proxy PROXY_URL, -p PROXY_URL
Make requests over a proxy. e.g.
socks5://127.0.0.1:1080
--json JSON_FILE, -j JSON_FILE
Load data from a JSON file or an online, valid, JSON
file.
--proxy_list PROXY_LIST, -pl PROXY_LIST
Make requests over a proxy randomly chosen from a list
generated from a .csv file.
--check_proxies CHECK_PROXY, -cp CHECK_PROXY
To be used with the '--proxy_list' parameter. The
script will check if the proxies supplied in the .csv
file are working and anonymous.Put 0 for no limit on
successfully checked proxies, or another number to
institute a limit.
--timeout TIMEOUT Time (in seconds) to wait for response to requests.
Default timeout of 60.0s.A longer timeout will be more
likely to get results from slow sites.On the other
hand, this may cause a long delay to gather all
results.
--print-found Do not output sites where the username was not found.

Run sherlock tool

  • python3 sherlock.py username
  • python3 sherlock.py username -r
  • python3 sherlock.py username -r --print_found
  • python3 sherlock.py username --site youtube
  • python3 sherlock.py username -t -o
Sherlock Tool used To Hunt Social Media Accounts

Thankyou

 

 

Post a Comment

0 Comments